General

  • Target

    bOja.exe

  • Size

    59KB

  • MD5

    758234189af5df0fc8ef3aab2cdef50d

  • SHA1

    2a64265c30c3405589f78ec8f23898fa44d215ae

  • SHA256

    9a6aa7bc60f817e2c0761373100d5bb22207847da7d8452db757b17c03c18c9c

  • SHA512

    dcf4415d65b9891c0b5d17d1f04ca10f564900e935f89830c0c91385c26d9e87c9bba38cf627e77f02aced7204ac4a1281d185d3eb841b5f7963863e924d2dba

  • SSDEEP

    1536:fQhoCxwD5cvP9NjvVwiPKb3btQAroC/BQq7rx:fQhoCxwD5c33vVBPKb3RoC/qqvx

Score
10/10

Malware Config

Extracted

Family

asyncrat

Version

| Edit 3LOSH RAT

Botnet

Default

C2

electroniccomerceanddatabasesforstudypurposesonly.online:5464

Mutex

AsyncMutex_6SI8OkPnk

Attributes
  • delay

    3

  • install

    false

  • install_file

    file

  • install_folder

    %AppData%

aes.plain

Signatures

  • Async RAT payload 1 IoCs
  • Asyncrat family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • bOja.exe
    .exe windows x86

    f34d5f2d4577ed6d9ceec516c1f5a744


    Headers

    Imports

    Sections